网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()
A

denial of service

B

brute force

C

reconnaissance

D

Trojan horse


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()A denial of serviceB brute forceC reconnaissanceD Trojan horse” 相关考题
考题 Once the TCP connection is established, which message type initiates the BGP peering process?() A. OpenB. ActiveC. UpdateD. Notification

考题 Which Packet Flow Acceleration feature is most effective for short-lived TCP sessions?() A. Active Flow PipeliningB. Fast Connection SetupC. TCP Acceleration (AFP)D. Forward Error Correction

考题 A user reports being occasionally disconnected from the server. Which of the following tools couldthe technician use to determine if it is the client or the server that is dropping the connection?() A. Packet snifferB. MultimeterC. Load balancerD. Throughput tester

考题 Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?() A.denial of serviceB.brute forceC.reconnaissanceD.Trojan horse

考题 Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。 A.denial of serviceB.brute forceC.reconnaissanceD.Trojan horse

考题 Which type of attacks can be monitored and mitigated by CS-MARS using NetFlow data?()A、 Man-in-themiddle attackB、 Spoof attackC、 Land.C attackD、 Buffer OverflowE、 Day zero attackF、 Trojan Horse

考题 How would you characterize the source and type in a denial of service attack on a router?()A、By perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatchesB、By performing a show interface to see the transmitted load "txload" and receive load "rxload" ;if the interface utilization is not maxed out ,there is no attack underwayC、By setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-input commands,then use the show access-list and show log commands to determine the type and sourceof attackD、By applying an access-list to all incoming and outgoing interfaces,turning off route-cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail

考题 Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()A、denial of serviceB、brute forceC、reconnaissanceD、Trojan horse

考题 Which software-based security threat is typically spread from user to user via e-mail?()A、VirusB、Trojan horseC、Denial of serviceD、Data interception

考题 BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()A、Sniffing attackB、Denial of service attackC、Port Scan attackD、Reconnaisance attackE、Spoofing attack

考题 Which statement is true about a Smurf attack?()A、It sends ping requests in segments of an invalid sizeB、It intercepts the third step in a TCP three-way handshake to hijack a sessionC、It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemD、It uses Trojan horse applications to create a distributed collection of "zombie" computers, which can beused to launch a coordinated DDoS attack

考题 What are four methods used by hackers? ()A、footprint analysis attackB、privilege escalation attackC、buffer Unicode attackD、social engineering attackE、front door attacksF、Trojan horse attack

考题 Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。A、denial of serviceB、brute forceC、reconnaissanceD、Trojan horse

考题 A user reports being occasionally disconnected from the server. Which of the following tools couldthe technician use to determine if it is the client or the server that is dropping the connection?()A、Packet snifferB、MultimeterC、Load balancerD、Throughput tester

考题 Once the TCP connection is established, which message type initiates the BGP peering process?()A、OpenB、ActiveC、UpdateD、Notification

考题 Which Packet Flow Acceleration feature is most effective for short-lived TCP sessions?()A、Active Flow PipeliningB、Fast Connection SetupC、TCP Acceleration (AFP)D、Forward Error Correction

考题 Once the TCP connection is established, which message type initiates the BGP peering process?()A、OpenB、ActiveC、UpdateD、KeepaliveE、Notification

考题 Your company has a server that runs Windows Server 2008 R2. The server is configured as a remoteaccess server. The external firewall has TCP port 80 and TCP port 443 open for remoteconnections. You have a home computer that runs Windows 7. You need to establish secure remote accessconnection from the home computer to the remote access server.  Which type of connection should you configure? ()A、IPSECB、L2TPC、PPTPD、SSTP

考题 单选题An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A DoSB SYN floodC port scanningD IP address sweep

考题 单选题Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server?()A denial of serviceB brute forceC reconnaissanceD Trojan horse 

考题 单选题Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()A close-connectionB terminate-connectionC close-client-and-serverD terminate-session

考题 单选题Once the TCP connection is established, which message type initiates the BGP peering process?()A OpenB ActiveC UpdateD KeepaliveE Notification

考题 单选题How would you characterize the source and type in a denial of service attack on a router?()A By perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatchesB By performing a show interface to see the transmitted load txload and receive load rxload ;if the interface utilization is not maxed out ,there is no attack underwayC By setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-input commands,then use the show access-list and show log commands to determine the type and sourceof attackD By applying an access-list to all incoming and outgoing interfaces,turning off route-cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail

考题 单选题Which statement is true about a Smurf attack?()A It sends ping requests in segments of an invalid sizeB It intercepts the third step in a TCP three-way handshake to hijack a sessionC It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemD It uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack

考题 单选题Which type of attacks can be monitored and mitigated by CS-MARS using NetFlow data?()A  Man-in-themiddle attackB  Spoof attackC  Land.C attackD  Buffer OverflowE  Day zero attackF  Trojan Horse

考题 单选题Your company has a server that runs Windows Server 2008 R2. The server is configured as a remoteaccess server. The external firewall has TCP port 80 and TCP port 443 open for remoteconnections. You have a home computer that runs Windows 7. You need to establish secure remote accessconnection from the home computer to the remote access server.  Which type of connection should you configure? ()A IPSECB L2TPC PPTPD SSTP

考题 单选题Which Packet Flow Acceleration feature is most effective for short-lived TCP sessions?()A Active Flow PipeliningB Fast Connection SetupC TCP Acceleration (AFP)D Forward Error Correction